Fabio
80+
- Katılım
- 23 Nisan 2023
- Mesajlar
- 45
Dahası
- Reaksiyon skoru
- 7
- İsim
- Fabio
Casper Excalibur g770 16 gb ram rtx3050 i5 12450h işlemci 512 Samsung SSD masaüstünde boşta dururken genelden mavi ekran alıyorum nedeni bilmiyorum hata kodlarına aşağıda listelenmiştir
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102923-19328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff802`2da00000 PsLoadedModuleList = 0xfffff802`2e6298a0
Debug session time: Sun Oct 29 01:37:05.123 2023 (UTC + 3:00)
System Uptime: 0 days 2:47:46.011
Loading Kernel Symbols
.DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`2de1d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff606`1eac1f40=0000000000000050
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe5f8f43810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8025ec1176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2609
Key : Analysis.Elapsed.mSec
Value: 61747
Key : Analysis.IO.Other.Mb
Value: 9
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 25
Key : Analysis.Init.CPU.mSec
Value: 953
Key : Analysis.Init.Elapsed.mSec
Value: 170910
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe5f8f43810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8025ec1176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102923-19328-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8022e705450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe5f8f43810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff6061eac21e0 -- (.trap 0xfffff6061eac21e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025ec1176a rsp=fffff6061eac2370 rbp=ffffc60bfe8adca0
r8=0000000000000a80 r9=fffff6061eac2420 r10=fffff8025ef7c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff802`5ec1176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
fffff606`1eac1f38 fffff802`2deea0a1 : 00000000`00000050 ffffe5f8`f43810f0 00000000`00000002 fffff606`1eac21e0 : nt!KeBugCheckEx
fffff606`1eac1f40 fffff802`2dd43636 : 00000000`000001d0 00000000`00000002 fffff606`1eac2140 00000000`00000000 : nt!MiSystemFault+0x189ff1
fffff606`1eac2040 fffff802`2de2e141 : 00000000`00000000 00000000`00000000 ffffc60c`07e7e920 ffffc60c`0504cfe0 : nt!MmAccessFault+0x2a6
fffff606`1eac21e0 fffff802`5ec1176a : 00000000`00000000 fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a : nt!KiPageFault+0x341
fffff606`1eac2370 00000000`00000000 : fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a ffffc60b`fe8ade10 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102123-18171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff806`5b400000 PsLoadedModuleList = 0xfffff806`5c0298a0
Debug session time: Sat Oct 21 14:35:34.603 2023 (UTC + 3:00)
System Uptime: 0 days 0:19:47.490
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`5b81d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa60b`6686ef40=0000000000000050
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff17b037810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068cba176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2139
Key : Analysis.Elapsed.mSec
Value: 20650
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 4
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 92026
Key : Analysis.Memory.CommitPeak.Mb
Value: 104
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff17b037810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8068cba176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102123-18171-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8065c105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff17b037810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa60b6686f1e0 -- (.trap 0xffffa60b6686f1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068cba176a rsp=ffffa60b6686f370 rbp=ffffd18cb60a38f0
r8=0000000000000a80 r9=ffffa60b6686f420 r10=fffff8068cf0c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff806`8cba176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
ffffa60b`6686ef38 fffff806`5b8ea0a1 : 00000000`00000050 fffff17b`037810f0 00000000`00000002 ffffa60b`6686f1e0 : nt!KeBugCheckEx
ffffa60b`6686ef40 fffff806`5b743636 : 00000000`00000210 00000000`00000002 ffffa60b`6686f140 00000000`00000000 : nt!MiSystemFault+0x189ff1
ffffa60b`6686f040 fffff806`5b82e141 : 00000000`00000000 00000000`00000000 ffffd18c`c1dd3960 ffffd18c`c4665030 : nt!MmAccessFault+0x2a6
ffffa60b`6686f1e0 fffff806`8cba176a : 00000000`00000000 fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a : nt!KiPageFault+0x341
ffffa60b`6686f370 00000000`00000000 : fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a ffffd18c`b60a3a60 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102123-18156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff800`72400000 PsLoadedModuleList = 0xfffff800`730298a0
Debug session time: Sat Oct 21 14:43:42.340 2023 (UTC + 3:00)
System Uptime: 0 days 0:07:27.227
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`7281d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa901`bfd9df40=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa5fc4ff810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff800a5aa176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.Elapsed.mSec
Value: 8482
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 72514
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa5fc4ff810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff800a5aa176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102123-18156-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff80073105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa5fc4ff810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa901bfd9e1e0 -- (.trap 0xffffa901bfd9e1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a5aa176a rsp=ffffa901bfd9e370 rbp=ffffc10d38408ca0
r8=0000000000000a80 r9=ffffa901bfd9e420 r10=fffff800a5e0c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff800`a5aa176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
ffffa901`bfd9df38 fffff800`728ea0a1 : 00000000`00000050 ffffa5fc`4ff810f0 00000000`00000002 ffffa901`bfd9e1e0 : nt!KeBugCheckEx
ffffa901`bfd9df40 fffff800`72743636 : 00000000`000001d0 00000000`00000002 ffffa901`bfd9e140 00000000`00000000 : nt!MiSystemFault+0x189ff1
ffffa901`bfd9e040 fffff800`7282e141 : 00000000`00000000 00000000`00000000 ffffc10d`43b02960 ffffc10d`41dccfe0 : nt!MmAccessFault+0x2a6
ffffa901`bfd9e1e0 fffff800`a5aa176a : 00000000`00000000 fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a : nt!KiPageFault+0x341
ffffa901`bfd9e370 00000000`00000000 : fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a ffffc10d`38408e10 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\022623-16281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff807`34200000 PsLoadedModuleList = 0xfffff807`34e29ba0
Debug session time: Sun Feb 26 12:22:25.814 2023 (UTC + 3:00)
System Uptime: 0 days 13:19:43.703
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0034e018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`3461bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffb681`afadade0=0000000000000133
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80734f05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.Elapsed.mSec
Value: 25807
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 86044
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Failure.Bucket
Value: 0x133_ISR_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80734f05330
BUGCHECK_P4: 0
FILE_IN_CAB: 022623-16281-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffffd87e00a70c0 -- (.trap 0xfffffd87e00a70c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000badf1020 rbx=0000000000000000 rcx=0000000000000012
rdx=0000000000000048 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80761b6fab8 rsp=fffffd87e00a7250 rbp=fffffd87e00a72d0
r8=fffffd87e00a7298 r9=0000000000000048 r10=ffffe705478ca380
r11=000000000000000c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0x8fab8:
fffff807`61b6fab8 488b5c2430 mov rbx,qword ptr [rsp+30h] ss:fffffd87`e00a7280=ffffe705478c8000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NeedForSpeedHeat.exe
STACK_TEXT:
ffffb681`afadadd8 fffff807`34431c8f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`34f05330 : nt!KeBugCheckEx
ffffb681`afadade0 fffff807`344318a1 : 00000e68`03e31774 ffffb681`00000500 00000000`00000002 fffff807`3442cfc8 : nt!KeAccumulateTicks+0x20f
ffffb681`afadae50 fffff807`3442fa8a : ffffb681`afac9200 fffffd87`e00a70c0 ffffb681`afac9338 00000000`00000a10 : nt!KiUpdateRunTime+0x61
ffffb681`afadaeb0 fffff807`3442f876 : ffffe705`3533a100 ffffe705`3533a1b0 ffffb681`00000000 ffffb681`afadafc0 : nt!KeClockInterruptNotify+0x11a
ffffb681`afadaf40 fffff807`34414650 : 00000000`0000000c ffff675c`f8551537 ffffe705`478c8a40 fffff807`3461dc1b : nt!HalpTimerClockIpiRoutine+0x16
ffffb681`afadaf70 fffff807`3461de7a : fffffd87`e00a7140 ffffe705`3533a100 00000e67`8cffe0f8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0
ffffb681`afadafb0 fffff807`3461e6e7 : 00000000`badf1020 00000000`00000440 00000000`00001100 fffffd87`e00a7268 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd87`e00a70c0 fffff807`61b6fab8 : 00000000`00000048 00000000`00000020 ffffe705`47972050 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd87`e00a7250 00000000`00000048 : 00000000`00000020 ffffe705`47972050 00000000`00000000 00000000`00000048 : nvlddmkm+0x8fab8
fffffd87`e00a7258 00000000`00000020 : ffffe705`47972050 00000000`00000000 00000000`00000048 fffff807`61c64af9 : 0x48
fffffd87`e00a7260 ffffe705`47972050 : 00000000`00000000 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 : 0x20
fffffd87`e00a7268 00000000`00000000 : 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 fffffd87`e00a72d0 : 0xffffe705`47972050
SYMBOL_NAME: nvlddmkm+8fab8
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 8fab8
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\041123-17015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff806`65e00000 PsLoadedModuleList = 0xfffff806`66a29ba0
Debug session time: Mon Apr 10 23:32:00.528 2023 (UTC + 3:00)
System Uptime: 21 days 16:44:45.200
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e3`da7ad018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`6621bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe108`4fea6c30=0000000000000050
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe281479d0a61, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068458d761, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
DBGHELP: Timeout to store: Symbol information
DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2671
Key : Analysis.Elapsed.mSec
Value: 182542
Key : Analysis.IO.Other.Mb
Value: 10
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 31
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 113131
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_vgk!unknown_function
Key : Failure.Hash
Value: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe281479d0a61
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8068458d761
BUGCHECK_P4: 0
FILE_IN_CAB: 041123-17015-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff80666b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe281479d0a61
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffe1084fea6ed0 -- (.trap 0xffffe1084fea6ed0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f00 rbx=0000000000000000 rcx=ffffe281479d0a61
rdx=fffffe87084d68df rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068458d761 rsp=ffffe1084fea7068 rbp=ffff800f744d42e0
r8=0000000000000010 r9=ffffe281479d0a61 r10=0000000000000a61
r11=ffffe281479d0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
vgk+0x2d761:
fffff806`8458d761 413801 cmp byte ptr [r9],al ds:ffffe281`479d0a61=00
Resetting default scope
STACK_TEXT:
ffffe108`4fea6c28 fffff806`662a1b51 : 00000000`00000050 ffffe281`479d0a61 00000000`00000000 ffffe108`4fea6ed0 : nt!KeBugCheckEx
ffffe108`4fea6c30 fffff806`66065396 : ffffe108`4fea6d58 00000000`00000000 ffffe108`4fea6e30 00000000`00000000 : nt!MiSystemFault+0x1c4b11
ffffe108`4fea6d30 fffff806`6622c741 : ffffe108`4fea6f60 fffff806`66221a94 ffff800f`744d4380 00000000`00000000 : nt!MmAccessFault+0x2a6
ffffe108`4fea6ed0 fffff806`8458d761 : fffff806`8463948c ffff800f`788e1e30 00000000`00000098 00000001`39372000 : nt!KiPageFault+0x341
ffffe108`4fea7068 fffff806`8463948c : ffff800f`788e1e30 00000000`00000098 00000001`39372000 00000000`000001b0 : vgk+0x2d761
ffffe108`4fea7070 ffff800f`788e1e30 : 00000000`00000098 00000001`39372000 00000000`000001b0 00000000`000001a0 : vgk+0xd948c
ffffe108`4fea7078 00000000`00000098 : 00000001`39372000 00000000`000001b0 00000000`000001a0 00000000`00000001 : 0xffff800f`788e1e30
ffffe108`4fea7080 00000001`39372000 : 00000000`000001b0 00000000`000001a0 00000000`00000001 00000000`00000001 : 0x98
ffffe108`4fea7088 00000000`000001b0 : 00000000`000001a0 00000000`00000001 00000000`00000001 ffff800f`907c9948 : 0x00000001`39372000
ffffe108`4fea7090 00000000`000001a0 : 00000000`00000001 00000000`00000001 ffff800f`907c9948 00000000`00000010 : 0x1b0
ffffe108`4fea7098 00000000`00000001 : 00000000`00000001 ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 : 0x1a0
ffffe108`4fea70a0 00000000`00000001 : ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 : 0x1
ffffe108`4fea70a8 ffff800f`907c9948 : 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 : 0x1
ffffe108`4fea70b0 00000000`00000010 : fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 00000001`39372000 : 0xffff800f`907c9948
ffffe108`4fea70b8 fffff806`84709ab3 : ffffe108`4fea7340 00000000`00000010 00000001`39372000 ffff800f`788e1e30 : 0x10
ffffe108`4fea70c0 ffffe108`4fea7340 : 00000000`00000010 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 : vgk+0x1a9ab3
ffffe108`4fea70c8 00000000`00000010 : 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 : 0xffffe108`4fea7340
ffffe108`4fea70d0 00000001`39372000 : ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 : 0x10
ffffe108`4fea70d8 ffff800f`788e1e30 : fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 : 0x00000001`39372000
ffffe108`4fea70e0 fffff806`84588970 : ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 : 0xffff800f`788e1e30
ffffe108`4fea70e8 ffffe108`4fea7550 : ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 : vgk+0x28970
ffffe108`4fea70f0 ffff800f`744d42b0 : 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 : 0xffffe108`4fea7550
ffffe108`4fea70f8 00000000`00000001 : ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc : 0xffff800f`744d42b0
ffffe108`4fea7100 ffff800f`9d303630 : ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 : 0x1
ffffe108`4fea7108 ffff800f`75d1e0b0 : ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 : 0xffff800f`9d303630
ffffe108`4fea7110 ffffe108`4fea7680 : adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 : 0xffff800f`75d1e0b0
ffffe108`4fea7118 adf31eb8`435902bc : 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 : 0xffffe108`4fea7680
ffffe108`4fea7120 00000000`00000001 : ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 00000000`00000010 : 0xadf31eb8`435902bc
ffffe108`4fea7128 ffffe108`4fea7340 : ffffe108`4fea7340 00000000`00000010 00000000`00000010 00000000`00000001 : 0x1
ffffe108`4fea7130 ffffe108`4fea7340 : 00000000`00000010 00000000`00000010 00000000`00000001 00000000`00000000 : 0xffffe108`4fea7340
ffffe108`4fea7138 00000000`00000010 : 00000000`00000010 00000000`00000001 00000000`00000000 00000000`00000001 : 0xffffe108`4fea7340
ffffe108`4fea7140 00000000`00000010 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000018 : 0x10
ffffe108`4fea7148 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000018 ffffe108`4fea7320 : 0x10
ffffe108`4fea7150 00000000`00000000 : 00000000`00000001 00000000`00000018 ffffe108`4fea7320 798910c2`4a734c69 : 0x1
SYMBOL_NAME: vgk+2d761
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d761
FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102923-19328-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff802`2da00000 PsLoadedModuleList = 0xfffff802`2e6298a0
Debug session time: Sun Oct 29 01:37:05.123 2023 (UTC + 3:00)
System Uptime: 0 days 2:47:46.011
Loading Kernel Symbols
.DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
....................................
Loading User Symbols
Loading unloaded module list
...............................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff802`2de1d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:fffff606`1eac1f40=0000000000000050
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe5f8f43810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8025ec1176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2609
Key : Analysis.Elapsed.mSec
Value: 61747
Key : Analysis.IO.Other.Mb
Value: 9
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 25
Key : Analysis.Init.CPU.mSec
Value: 953
Key : Analysis.Init.Elapsed.mSec
Value: 170910
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe5f8f43810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8025ec1176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102923-19328-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8022e705450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe5f8f43810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: fffff6061eac21e0 -- (.trap 0xfffff6061eac21e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8025ec1176a rsp=fffff6061eac2370 rbp=ffffc60bfe8adca0
r8=0000000000000a80 r9=fffff6061eac2420 r10=fffff8025ef7c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff802`5ec1176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
fffff606`1eac1f38 fffff802`2deea0a1 : 00000000`00000050 ffffe5f8`f43810f0 00000000`00000002 fffff606`1eac21e0 : nt!KeBugCheckEx
fffff606`1eac1f40 fffff802`2dd43636 : 00000000`000001d0 00000000`00000002 fffff606`1eac2140 00000000`00000000 : nt!MiSystemFault+0x189ff1
fffff606`1eac2040 fffff802`2de2e141 : 00000000`00000000 00000000`00000000 ffffc60c`07e7e920 ffffc60c`0504cfe0 : nt!MmAccessFault+0x2a6
fffff606`1eac21e0 fffff802`5ec1176a : 00000000`00000000 fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a : nt!KiPageFault+0x341
fffff606`1eac2370 00000000`00000000 : fffff802`5ec2b2de ffffc60c`0504d010 fffff802`5ed9fb6a ffffc60b`fe8ade10 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102123-18171-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff806`5b400000 PsLoadedModuleList = 0xfffff806`5c0298a0
Debug session time: Sat Oct 21 14:35:34.603 2023 (UTC + 3:00)
System Uptime: 0 days 0:19:47.490
Loading Kernel Symbols
.
Press ctrl-c (cdb, kd, ntsd) or ctrl-break (windbg) to abort symbol loads that take too long.
Run !sym noisy before .reload to track down problems loading symbols.
..............................................................
................................................................
................................................................
...............................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`5b81d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa60b`6686ef40=0000000000000050
4: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: fffff17b037810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068cba176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 2139
Key : Analysis.Elapsed.mSec
Value: 20650
Key : Analysis.IO.Other.Mb
Value: 1
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 4
Key : Analysis.Init.CPU.mSec
Value: 546
Key : Analysis.Init.Elapsed.mSec
Value: 92026
Key : Analysis.Memory.CommitPeak.Mb
Value: 104
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: fffff17b037810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff8068cba176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102123-18171-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff8065c105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
fffff17b037810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa60b6686f1e0 -- (.trap 0xffffa60b6686f1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068cba176a rsp=ffffa60b6686f370 rbp=ffffd18cb60a38f0
r8=0000000000000a80 r9=ffffa60b6686f420 r10=fffff8068cf0c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff806`8cba176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
ffffa60b`6686ef38 fffff806`5b8ea0a1 : 00000000`00000050 fffff17b`037810f0 00000000`00000002 ffffa60b`6686f1e0 : nt!KeBugCheckEx
ffffa60b`6686ef40 fffff806`5b743636 : 00000000`00000210 00000000`00000002 ffffa60b`6686f140 00000000`00000000 : nt!MiSystemFault+0x189ff1
ffffa60b`6686f040 fffff806`5b82e141 : 00000000`00000000 00000000`00000000 ffffd18c`c1dd3960 ffffd18c`c4665030 : nt!MmAccessFault+0x2a6
ffffa60b`6686f1e0 fffff806`8cba176a : 00000000`00000000 fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a : nt!KiPageFault+0x341
ffffa60b`6686f370 00000000`00000000 : fffff806`8cbbb2de ffffd18c`c4665050 fffff806`8cd2fb6a ffffd18c`b60a3a60 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.016 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\102123-18156-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff800`72400000 PsLoadedModuleList = 0xfffff800`730298a0
Debug session time: Sat Oct 21 14:43:42.340 2023 (UTC + 3:00)
System Uptime: 0 days 0:07:27.227
Loading Kernel Symbols
...............................................................
................................................................
................................................................
......................................
Loading User Symbols
Loading unloaded module list
...............
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff800`7281d780 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffa901`bfd9df40=0000000000000050
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffa5fc4ff810f0, memory referenced.
Arg2: 0000000000000002, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff800a5aa176a, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000002, (reserved)
Debugging Details:
------------------
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Write
Key : Analysis.CPU.mSec
Value: 1874
Key : Analysis.Elapsed.mSec
Value: 8482
Key : Analysis.IO.Other.Mb
Value: 0
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 1
Key : Analysis.Init.CPU.mSec
Value: 312
Key : Analysis.Init.Elapsed.mSec
Value: 72514
Key : Analysis.Memory.CommitPeak.Mb
Value: 99
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_W_(null)_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {838100fa-f28b-2ef7-d702-e31713cb338c}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffa5fc4ff810f0
BUGCHECK_P2: 2
BUGCHECK_P3: fffff800a5aa176a
BUGCHECK_P4: 2
FILE_IN_CAB: 102123-18156-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff80073105450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffa5fc4ff810f0
MM_INTERNAL_CODE: 2
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
TRAP_FRAME: ffffa901bfd9e1e0 -- (.trap 0xffffa901bfd9e1e0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=0000000000000a80
rdx=0000000000000000 rsi=0000000000000000 rdi=0000000000000000
rip=fffff800a5aa176a rsp=ffffa901bfd9e370 rbp=ffffc10d38408ca0
r8=0000000000000a80 r9=ffffa901bfd9e420 r10=fffff800a5e0c5f0
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
nvlddmkm+0x9176a:
fffff800`a5aa176a f3aa rep stos byte ptr [rdi]
Resetting default scope
STACK_TEXT:
ffffa901`bfd9df38 fffff800`728ea0a1 : 00000000`00000050 ffffa5fc`4ff810f0 00000000`00000002 ffffa901`bfd9e1e0 : nt!KeBugCheckEx
ffffa901`bfd9df40 fffff800`72743636 : 00000000`000001d0 00000000`00000002 ffffa901`bfd9e140 00000000`00000000 : nt!MiSystemFault+0x189ff1
ffffa901`bfd9e040 fffff800`7282e141 : 00000000`00000000 00000000`00000000 ffffc10d`43b02960 ffffc10d`41dccfe0 : nt!MmAccessFault+0x2a6
ffffa901`bfd9e1e0 fffff800`a5aa176a : 00000000`00000000 fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a : nt!KiPageFault+0x341
ffffa901`bfd9e370 00000000`00000000 : fffff800`a5abb2de ffffc10d`41dcd010 fffff800`a5c2fb6a ffffc10d`38408e10 : nvlddmkm+0x9176a
SYMBOL_NAME: nvlddmkm+9176a
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 9176a
FAILURE_BUCKET_ID: AV_W_(null)_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {838100fa-f28b-2ef7-d702-e31713cb338c}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.015 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\022623-16281-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff807`34200000 PsLoadedModuleList = 0xfffff807`34e29ba0
Debug session time: Sun Feb 26 12:22:25.814 2023 (UTC + 3:00)
System Uptime: 0 days 13:19:43.703
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................
Loading User Symbols
PEB is paged out (Peb.Ldr = 00000000`0034e018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff807`3461bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:ffffb681`afadade0=0000000000000133
8: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DPC_WATCHDOG_VIOLATION (133)
The DPC watchdog detected a prolonged run time at an IRQL of DISPATCH_LEVEL
or above.
Arguments:
Arg1: 0000000000000001, The system cumulatively spent an extended period of time at
DISPATCH_LEVEL or above.
Arg2: 0000000000001e00, The watchdog period (in ticks).
Arg3: fffff80734f05330, cast to nt!DPC_WATCHDOG_GLOBAL_TRIAGE_BLOCK, which contains
additional information regarding the cumulative timeout
Arg4: 0000000000000000
Debugging Details:
------------------
*************************************************************************
*** ***
*** ***
*** Either you specified an unqualified symbol, or your debugger ***
*** doesn't have full symbol information. Unqualified symbol ***
*** resolution is turned off by default. Please either specify a ***
*** fully qualified symbol module!symbolname, or enable resolution ***
*** of unqualified symbols by typing ".symopt- 100". Note that ***
*** enabling unqualified symbol resolution with network symbol ***
*** server shares in the symbol path may cause the debugger to ***
*** appear to hang for long periods of time when an incorrect ***
*** symbol name is typed or the network symbol server is down. ***
*** ***
*** For some commands to work properly, your symbol path ***
*** must point to .pdb files that have full type information. ***
*** ***
*** Certain .pdb files (such as the public OS symbols) do not ***
*** contain the required information. Contact the group that ***
*** provided you with these symbols if you need this command to ***
*** work. ***
*** ***
*** Type referenced: TickPeriods ***
*** ***
*************************************************************************
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 2202
Key : Analysis.Elapsed.mSec
Value: 25807
Key : Analysis.IO.Other.Mb
Value: 7
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 24
Key : Analysis.Init.CPU.mSec
Value: 781
Key : Analysis.Init.Elapsed.mSec
Value: 86044
Key : Analysis.Memory.CommitPeak.Mb
Value: 100
Key : Bugcheck.Code.LegacyAPI
Value: 0x133
Key : Failure.Bucket
Value: 0x133_ISR_nvlddmkm!unknown_function
Key : Failure.Hash
Value: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 133
BUGCHECK_P1: 1
BUGCHECK_P2: 1e00
BUGCHECK_P3: fffff80734f05330
BUGCHECK_P4: 0
FILE_IN_CAB: 022623-16281-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
DPC_TIMEOUT_TYPE: DPC_QUEUE_EXECUTION_TIMEOUT_EXCEEDED
TRAP_FRAME: fffffd87e00a70c0 -- (.trap 0xfffffd87e00a70c0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000badf1020 rbx=0000000000000000 rcx=0000000000000012
rdx=0000000000000048 rsi=0000000000000000 rdi=0000000000000000
rip=fffff80761b6fab8 rsp=fffffd87e00a7250 rbp=fffffd87e00a72d0
r8=fffffd87e00a7298 r9=0000000000000048 r10=ffffe705478ca380
r11=000000000000000c r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nvlddmkm+0x8fab8:
fffff807`61b6fab8 488b5c2430 mov rbx,qword ptr [rsp+30h] ss:fffffd87`e00a7280=ffffe705478c8000
Resetting default scope
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: NeedForSpeedHeat.exe
STACK_TEXT:
ffffb681`afadadd8 fffff807`34431c8f : 00000000`00000133 00000000`00000001 00000000`00001e00 fffff807`34f05330 : nt!KeBugCheckEx
ffffb681`afadade0 fffff807`344318a1 : 00000e68`03e31774 ffffb681`00000500 00000000`00000002 fffff807`3442cfc8 : nt!KeAccumulateTicks+0x20f
ffffb681`afadae50 fffff807`3442fa8a : ffffb681`afac9200 fffffd87`e00a70c0 ffffb681`afac9338 00000000`00000a10 : nt!KiUpdateRunTime+0x61
ffffb681`afadaeb0 fffff807`3442f876 : ffffe705`3533a100 ffffe705`3533a1b0 ffffb681`00000000 ffffb681`afadafc0 : nt!KeClockInterruptNotify+0x11a
ffffb681`afadaf40 fffff807`34414650 : 00000000`0000000c ffff675c`f8551537 ffffe705`478c8a40 fffff807`3461dc1b : nt!HalpTimerClockIpiRoutine+0x16
ffffb681`afadaf70 fffff807`3461de7a : fffffd87`e00a7140 ffffe705`3533a100 00000e67`8cffe0f8 00000000`00000000 : nt!KiCallInterruptServiceRoutine+0xa0
ffffb681`afadafb0 fffff807`3461e6e7 : 00000000`badf1020 00000000`00000440 00000000`00001100 fffffd87`e00a7268 : nt!KiInterruptSubDispatchNoLockNoEtw+0xfa
fffffd87`e00a70c0 fffff807`61b6fab8 : 00000000`00000048 00000000`00000020 ffffe705`47972050 00000000`00000000 : nt!KiInterruptDispatchNoLockNoEtw+0x37
fffffd87`e00a7250 00000000`00000048 : 00000000`00000020 ffffe705`47972050 00000000`00000000 00000000`00000048 : nvlddmkm+0x8fab8
fffffd87`e00a7258 00000000`00000020 : ffffe705`47972050 00000000`00000000 00000000`00000048 fffff807`61c64af9 : 0x48
fffffd87`e00a7260 ffffe705`47972050 : 00000000`00000000 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 : 0x20
fffffd87`e00a7268 00000000`00000000 : 00000000`00000048 fffff807`61c64af9 ffffe705`478c8000 fffffd87`e00a72d0 : 0xffffe705`47972050
SYMBOL_NAME: nvlddmkm+8fab8
MODULE_NAME: nvlddmkm
IMAGE_NAME: nvlddmkm.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 8fab8
FAILURE_BUCKET_ID: 0x133_ISR_nvlddmkm!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {f97493a5-ea2b-23ca-a808-8602773c2a86}
Followup: MachineOwner
---------
************* Preparing the environment for Debugger Extensions Gallery repositories **************
ExtensionRepository : Implicit
UseExperimentalFeatureForNugetShare : false
AllowNugetExeUpdate : false
AllowNugetMSCredentialProviderInstall : false
AllowParallelInitializationOfLocalRepositories : true
-- Configuring repositories
----> Repository : LocalInstalled, Enabled: true
----> Repository : UserExtensions, Enabled: true
>>>>>>>>>>>>> Preparing the environment for Debugger Extensions Gallery repositories completed, duration 0.000 seconds
************* Waiting for Debugger Extensions Gallery to Initialize **************
>>>>>>>>>>>>> Waiting for Debugger Extensions Gallery to Initialize completed, duration 0.031 seconds
----> Repository : UserExtensions, Enabled: true, Packages count: 0
----> Repository : LocalInstalled, Enabled: true, Packages count: 36
Microsoft (R) Windows Debugger Version 10.0.25877.1004 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [C:\Users\Ferhat\Desktop\041123-17015-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
************* Path validation summary **************
Response Time (ms) Location
Deferred srv*
Symbol search path is: srv*
Executable search path is:
Windows 10 Kernel Version 22000 MP (12 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Edition build lab: 22000.1.amd64fre.co_release.210604-1628
Kernel base = 0xfffff806`65e00000 PsLoadedModuleList = 0xfffff806`66a29ba0
Debug session time: Mon Apr 10 23:32:00.528 2023 (UTC + 3:00)
System Uptime: 21 days 16:44:45.200
Loading Kernel Symbols
...............................................................
................................................................
................................................................
.....................................
Loading User Symbols
PEB is paged out (Peb.Ldr = 000000e3`da7ad018). Type ".hh dbgerr001" for details
Loading unloaded module list
..................................................
For analysis of this file, run !analyze -v
nt!KeBugCheckEx:
fffff806`6621bd30 48894c2408 mov qword ptr [rsp+8],rcx ss:0018:ffffe108`4fea6c30=0000000000000050
11: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except.
Typically the address is just plain bad or it is pointing at freed memory.
Arguments:
Arg1: ffffe281479d0a61, memory referenced.
Arg2: 0000000000000000, X64: bit 0 set if the fault was due to a not-present PTE.
bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the processor decided the fault was due to a corrupted PTE.
bit 4 is set if the fault was due to attempted execute of a no-execute PTE.
- ARM64: bit 1 is set if the fault was due to a write, clear if a read.
bit 3 is set if the fault was due to attempted execute of a no-execute PTE.
Arg3: fffff8068458d761, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
DBGHELP: Timeout to store: Symbol information
DBGHELP: Timeout to store: C:\ProgramData\Dbg\sym*Symbol information
KEY_VALUES_STRING: 1
Key : AV.Type
Value: Read
Key : Analysis.CPU.mSec
Value: 2671
Key : Analysis.Elapsed.mSec
Value: 182542
Key : Analysis.IO.Other.Mb
Value: 10
Key : Analysis.IO.Read.Mb
Value: 0
Key : Analysis.IO.Write.Mb
Value: 31
Key : Analysis.Init.CPU.mSec
Value: 890
Key : Analysis.Init.Elapsed.mSec
Value: 113131
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : Bugcheck.Code.LegacyAPI
Value: 0x50
Key : Failure.Bucket
Value: AV_R_(null)_vgk!unknown_function
Key : Failure.Hash
Value: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Key : Hypervisor.Enlightenments.Value
Value: 68673420
Key : Hypervisor.Enlightenments.ValueHex
Value: 417df8c
Key : Hypervisor.Flags.AnyHypervisorPresent
Value: 1
Key : Hypervisor.Flags.ApicEnlightened
Value: 0
Key : Hypervisor.Flags.ApicVirtualizationAvailable
Value: 1
Key : Hypervisor.Flags.AsyncMemoryHint
Value: 0
Key : Hypervisor.Flags.CoreSchedulerRequested
Value: 0
Key : Hypervisor.Flags.CpuManager
Value: 1
Key : Hypervisor.Flags.DeprecateAutoEoi
Value: 1
Key : Hypervisor.Flags.DynamicCpuDisabled
Value: 1
Key : Hypervisor.Flags.Epf
Value: 0
Key : Hypervisor.Flags.ExtendedProcessorMasks
Value: 1
Key : Hypervisor.Flags.HardwareMbecAvailable
Value: 1
Key : Hypervisor.Flags.MaxBankNumber
Value: 0
Key : Hypervisor.Flags.MemoryZeroingControl
Value: 0
Key : Hypervisor.Flags.NoExtendedRangeFlush
Value: 0
Key : Hypervisor.Flags.NoNonArchCoreSharing
Value: 1
Key : Hypervisor.Flags.Phase0InitDone
Value: 1
Key : Hypervisor.Flags.PowerSchedulerQos
Value: 0
Key : Hypervisor.Flags.RootScheduler
Value: 0
Key : Hypervisor.Flags.SynicAvailable
Value: 1
Key : Hypervisor.Flags.UseQpcBias
Value: 0
Key : Hypervisor.Flags.Value
Value: 21631230
Key : Hypervisor.Flags.ValueHex
Value: 14a10fe
Key : Hypervisor.Flags.VpAssistPage
Value: 1
Key : Hypervisor.Flags.VsmAvailable
Value: 1
Key : Hypervisor.RootFlags.AccessStats
Value: 1
Key : Hypervisor.RootFlags.CrashdumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.CreateVirtualProcessor
Value: 1
Key : Hypervisor.RootFlags.DisableHyperthreading
Value: 0
Key : Hypervisor.RootFlags.HostTimelineSync
Value: 1
Key : Hypervisor.RootFlags.HypervisorDebuggingEnabled
Value: 0
Key : Hypervisor.RootFlags.IsHyperV
Value: 1
Key : Hypervisor.RootFlags.LivedumpEnlightened
Value: 1
Key : Hypervisor.RootFlags.MapDeviceInterrupt
Value: 1
Key : Hypervisor.RootFlags.MceEnlightened
Value: 1
Key : Hypervisor.RootFlags.Nested
Value: 0
Key : Hypervisor.RootFlags.StartLogicalProcessor
Value: 1
Key : Hypervisor.RootFlags.Value
Value: 1015
Key : Hypervisor.RootFlags.ValueHex
Value: 3f7
Key : WER.OS.Branch
Value: co_release
Key : WER.OS.Version
Value: 10.0.22000.1
BUGCHECK_CODE: 50
BUGCHECK_P1: ffffe281479d0a61
BUGCHECK_P2: 0
BUGCHECK_P3: fffff8068458d761
BUGCHECK_P4: 0
FILE_IN_CAB: 041123-17015-01.dmp
TAG_NOT_DEFINED_202b: *** Unknown TAG in analysis list 202b
READ_ADDRESS: fffff80666b05450: Unable to get MiVisibleState
Unable to get NonPagedPoolStart
Unable to get NonPagedPoolEnd
Unable to get PagedPoolStart
Unable to get PagedPoolEnd
unable to get nt!MmSpecialPagesInUse
ffffe281479d0a61
MM_INTERNAL_CODE: 0
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: vgc.exe
TRAP_FRAME: ffffe1084fea6ed0 -- (.trap 0xffffe1084fea6ed0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000f00 rbx=0000000000000000 rcx=ffffe281479d0a61
rdx=fffffe87084d68df rsi=0000000000000000 rdi=0000000000000000
rip=fffff8068458d761 rsp=ffffe1084fea7068 rbp=ffff800f744d42e0
r8=0000000000000010 r9=ffffe281479d0a61 r10=0000000000000a61
r11=ffffe281479d0000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz ac po cy
vgk+0x2d761:
fffff806`8458d761 413801 cmp byte ptr [r9],al ds:ffffe281`479d0a61=00
Resetting default scope
STACK_TEXT:
ffffe108`4fea6c28 fffff806`662a1b51 : 00000000`00000050 ffffe281`479d0a61 00000000`00000000 ffffe108`4fea6ed0 : nt!KeBugCheckEx
ffffe108`4fea6c30 fffff806`66065396 : ffffe108`4fea6d58 00000000`00000000 ffffe108`4fea6e30 00000000`00000000 : nt!MiSystemFault+0x1c4b11
ffffe108`4fea6d30 fffff806`6622c741 : ffffe108`4fea6f60 fffff806`66221a94 ffff800f`744d4380 00000000`00000000 : nt!MmAccessFault+0x2a6
ffffe108`4fea6ed0 fffff806`8458d761 : fffff806`8463948c ffff800f`788e1e30 00000000`00000098 00000001`39372000 : nt!KiPageFault+0x341
ffffe108`4fea7068 fffff806`8463948c : ffff800f`788e1e30 00000000`00000098 00000001`39372000 00000000`000001b0 : vgk+0x2d761
ffffe108`4fea7070 ffff800f`788e1e30 : 00000000`00000098 00000001`39372000 00000000`000001b0 00000000`000001a0 : vgk+0xd948c
ffffe108`4fea7078 00000000`00000098 : 00000001`39372000 00000000`000001b0 00000000`000001a0 00000000`00000001 : 0xffff800f`788e1e30
ffffe108`4fea7080 00000001`39372000 : 00000000`000001b0 00000000`000001a0 00000000`00000001 00000000`00000001 : 0x98
ffffe108`4fea7088 00000000`000001b0 : 00000000`000001a0 00000000`00000001 00000000`00000001 ffff800f`907c9948 : 0x00000001`39372000
ffffe108`4fea7090 00000000`000001a0 : 00000000`00000001 00000000`00000001 ffff800f`907c9948 00000000`00000010 : 0x1b0
ffffe108`4fea7098 00000000`00000001 : 00000000`00000001 ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 : 0x1a0
ffffe108`4fea70a0 00000000`00000001 : ffff800f`907c9948 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 : 0x1
ffffe108`4fea70a8 ffff800f`907c9948 : 00000000`00000010 fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 : 0x1
ffffe108`4fea70b0 00000000`00000010 : fffff806`84709ab3 ffffe108`4fea7340 00000000`00000010 00000001`39372000 : 0xffff800f`907c9948
ffffe108`4fea70b8 fffff806`84709ab3 : ffffe108`4fea7340 00000000`00000010 00000001`39372000 ffff800f`788e1e30 : 0x10
ffffe108`4fea70c0 ffffe108`4fea7340 : 00000000`00000010 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 : vgk+0x1a9ab3
ffffe108`4fea70c8 00000000`00000010 : 00000001`39372000 ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 : 0xffffe108`4fea7340
ffffe108`4fea70d0 00000001`39372000 : ffff800f`788e1e30 fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 : 0x10
ffffe108`4fea70d8 ffff800f`788e1e30 : fffff806`84588970 ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 : 0x00000001`39372000
ffffe108`4fea70e0 fffff806`84588970 : ffffe108`4fea7550 ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 : 0xffff800f`788e1e30
ffffe108`4fea70e8 ffffe108`4fea7550 : ffff800f`744d42b0 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 : vgk+0x28970
ffffe108`4fea70f0 ffff800f`744d42b0 : 00000000`00000001 ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 : 0xffffe108`4fea7550
ffffe108`4fea70f8 00000000`00000001 : ffff800f`9d303630 ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc : 0xffff800f`744d42b0
ffffe108`4fea7100 ffff800f`9d303630 : ffff800f`75d1e0b0 ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 : 0x1
ffffe108`4fea7108 ffff800f`75d1e0b0 : ffffe108`4fea7680 adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 : 0xffff800f`9d303630
ffffe108`4fea7110 ffffe108`4fea7680 : adf31eb8`435902bc 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 : 0xffff800f`75d1e0b0
ffffe108`4fea7118 adf31eb8`435902bc : 00000000`00000001 ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 : 0xffffe108`4fea7680
ffffe108`4fea7120 00000000`00000001 : ffffe108`4fea7340 ffffe108`4fea7340 00000000`00000010 00000000`00000010 : 0xadf31eb8`435902bc
ffffe108`4fea7128 ffffe108`4fea7340 : ffffe108`4fea7340 00000000`00000010 00000000`00000010 00000000`00000001 : 0x1
ffffe108`4fea7130 ffffe108`4fea7340 : 00000000`00000010 00000000`00000010 00000000`00000001 00000000`00000000 : 0xffffe108`4fea7340
ffffe108`4fea7138 00000000`00000010 : 00000000`00000010 00000000`00000001 00000000`00000000 00000000`00000001 : 0xffffe108`4fea7340
ffffe108`4fea7140 00000000`00000010 : 00000000`00000001 00000000`00000000 00000000`00000001 00000000`00000018 : 0x10
ffffe108`4fea7148 00000000`00000001 : 00000000`00000000 00000000`00000001 00000000`00000018 ffffe108`4fea7320 : 0x10
ffffe108`4fea7150 00000000`00000000 : 00000000`00000001 00000000`00000018 ffffe108`4fea7320 798910c2`4a734c69 : 0x1
SYMBOL_NAME: vgk+2d761
MODULE_NAME: vgk
IMAGE_NAME: vgk.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: 2d761
FAILURE_BUCKET_ID: AV_R_(null)_vgk!unknown_function
OS_VERSION: 10.0.22000.1
BUILDLAB_STR: co_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {2c74f9bf-c695-1cb8-996e-ae91d1a2ef92}
Followup: MachineOwner
---------